Best IT Management Software for Palo Alto Networks NGFW

Find and compare the best IT Management software for Palo Alto Networks NGFW in 2025

Use the comparison tool below to compare the top IT Management software for Palo Alto Networks NGFW on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    PathSolutions TotalView Reviews
    Top Pick

    PathSolutions

    $5,747 perpetual
    42 Ratings
    Top Pick See Software
    Learn More
    TotalView offers network monitoring as well as root-cause troubleshooting of problems in plain-English. The solution monitors every device as well as every interface on every device. In addition, TotalView goes deep, collecting 19 error counters, performance, configuration, and connectedness so nothing is outside of it’s view. A built-in heuristics engine analyzes this information to produce plain-English answers to problems. Complex problems can now be solved by junior level engineers leaving the senior level engineers to work on more strategic level projects. The core product includes everything needed to run a perfectly healthy network: Configuration management, server monitoring, cloud service monitoring, IPAM, NetFlow, path mapping, and diagramming. Get Total Network Visibility on your network and solve more problems faster.
  • 2
    Netreo Reviews

    Netreo

    Netreo

    $5/resource/mo
    1 Rating
    Netreo is the best full-stack IT infrastructure management and observation platform. Netreo is a single source for truth for proactive performance monitoring and availability monitoring of large enterprise networks, infrastructure, and applications. Our solution is used by: IT executives should have full visibility of the business service, right down to the infrastructure and network that supports them. IT Engineering departments are used as a decision support system to plan and architect modern solutions. IT Operations teams can have real-time visibility into what is going wrong in their environment, which bottlenecks exist, and who it is affecting. All of these insights are available for systems and vendor mix in large heterogeneous environments that are constantly changing. We have a growing list of vendors that we support (over 350 integrations), including network vendors, storage, virtualization, and servers.
  • 3
    Checkmk Reviews
    Checkmk is an IT monitoring system that allows system administrators, IT managers and DevOps teams, to quickly identify and resolve issues across their entire IT infrastructure (servers and applications, networks, storage and databases, containers, etc. Checkmk is used daily by more than 2,000 commercial customers worldwide and many other open-source users. Key product features * Service state monitoring with nearly 2,000 checks 'outside the box' * Event-based and log-based monitoring * Metrics, dynamic Graphing, and Long-Term Storage * Comprehensive reporting incl. Accessibility and SLAs * Flexible notifications and automated alert handling * Monitoring business processes and complex systems * Software and hardware inventory * Graphical, rule-based configuration and automated service discovery These are the top use cases * Server Monitoring * Network Monitoring * Application Monitoring * Database Monitoring * Storage Monitoring * Cloud Monitoring * Container Monitoring
  • 4
    Secret Double Octopus Reviews

    Secret Double Octopus

    Secret Double Octopus

    $3/month/user
    SDO offers end-to-end workforce passwordless authentication and desktop MFA solutions for enterprise workforces. The Octopus Authentication Platform plugs into VPNs for more secure remote access, VDI and SSO portals such as Okta SSO, Ping Identity, Microsoft ADFS and ForgeRock. The solution can integrate into Okta Verify or ForgeRock MFA, as well as integrate with Cisco Duo or RSA SecureID. It is the most flexible and complete way to go passwordless in the market today. Password management tools become obsolete in a world where SDO eliminates the password, lowering help desk costs. As a FIDO2-certified server, Secret Double Octopus supports any FIDO2-certified key such as Yubico, Feitian and Google's Titan key. Secret Double Octopus is the perfect next generation authentication solution for Zero Trust network access and re-architecture initiatives.
  • 5
    IRONSCALES Reviews

    IRONSCALES

    IRONSCALES

    $4.50 per user per month
    IRONSCALES offers an API-connected, AI-driven email security and training solution to help companies defend against advanced phishing attacks. We believe that phishing is a human + machine problem that can only be solved with a human + machine solution. This unique approach sets us apart from our competitors in this space.
  • 6
    Armis Reviews

    Armis

    Armis Security

    Armis, the leading asset visibility and security company, provides a unified asset intelligence platform designed to address the new extended attack surface that connected assets create. Fortune 100 companies trust our real-time and continuous protection to see with full context all managed, unmanaged assets across IT, cloud, IoT devices, IoMT, OT, ICS, and 5G. Armis provides passive cyber asset management, risk management, and automated enforcement. Armis is a privately held company and headquartered in California.
  • 7
    Alibaba Cloud SSL Certificates Service Reviews
    Alibaba Cloud SSL Certificates Service allows customers directly to apply, buy and manage SSL certificates. This service is available in cooperation with qualified certificate authorities. Customers can choose the expected certificate authority and its products from this platform to receive full-site HTTPS security. For optimal cost efficiency, manage digital certificates from a single platform. All major Linux and Windows operating systems are supported, as well as the Alibaba Cloud network, VPC, hybrid clouds, and traditional IDC environments. Full-site HTTPS can be implemented with minimal cost using one platform that allows you to manage multiple digital certificates that can all be used to access multiple Alibaba Cloud services. You can view certificates used by different cloud businesses and place your own orders on a single platform.
  • 8
    Comarch EDI Reviews
    A secure and comprehensive platform for B2B collaboration within a supply chain. The Comarch EDI platform allows data exchange with all business partners. We recommend a solution that is tailored to your company's business needs, in relation to technological advancements and the volume document. We offer a variety of functionalities that will simplify communication with business partners. A GDSN-certified catalog allows for the management of product data that is exchanged with many business partners around the world. It makes it possible to define multiple attributes - both general and specific to a business partner. This functionality ensures coherence and high quality data throughout the entire value-chain. This is the solution to optimizing supply chain processes. It allows for effective communication between logistics operators and ensures fast and secure data flow.
  • 9
    CyberArk Workforce Identity Reviews
    CyberArk Workforce Identity (formerly Idaptive) empowers your workforce by providing easy and secure access to business resources. Your users need quick access a variety business resources. You need to be able to trust that they are knocking, not an attacker. CyberArk Workforce Identity allows you to empower your workforce and keep threats out. Your team can set the stage for success and open up new opportunities. Strong AI-powered, password-free, risk-aware authentication can validate identities. Streamline the management of app access requests, account creation, and termination. Workers should be working, not logging out and in. AI-powered analytics can help you make intelligent access decisions. Access is possible from any device, at any time.
  • Previous
  • You're on page 1
  • Next